CVE-2021-47671
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/04/2025
Last modified:
21/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
can: etas_es58x: es58x_rx_err_msg(): fix memory leak in error path<br />
<br />
In es58x_rx_err_msg(), if can->do_set_mode() fails, the function<br />
directly returns without calling netif_rx(skb). This means that the<br />
skb previously allocated by alloc_can_err_skb() is not freed. In other<br />
terms, this is a memory leak.<br />
<br />
This patch simply removes the return statement in the error branch and<br />
let the function continue.<br />
<br />
Issue was found with GCC -fanalyzer, please follow the link below for<br />
details.
Impact
Base Score 3.x
3.30
Severity 3.x
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.13 (including) | 5.14.19 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15 (including) | 5.15.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



